Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
Filter
Type of Medium
Language
Region
Library
Years
Keywords
  • 1
    UID:
    gbv_1804084948
    Format: 1 online resource (256 pages).
    Edition: First edition.
    ISBN: 9781003215851 , 1003215858 , 9781000545760 , 1000545768 , 9781000545777 , 1000545776
    Content: 1. The Changing Face of Healthcare Security" How has Hospital Security Changed Since 9/11" Aspects of Hospital Security: How is Hospital Security Changing in the New Century? " Hospital Security in the 21st Century: What Should We Expect " The Changing Face of Hospital Security: Retooling for the Future " The Changing Face of Hospital Security2. Security Management" The Hidden Cost of Downsizing: Where Loyalty Dies, Fraud Grows: " Stretching the Security Dollar " Investigating in a New Environment " Shoplifter Profiles and Tips on How They Steal " Asking the Right Questions About Fire Prevention " Putting the Spotlight on Security " Improving the Dependability of an ID Program 3. Disaster PreparednessTraining Security Officers to Recognize the Perils of Weapons of Mass Destruction and Pandemic Flu Contaminates Training Security Operatives to Recognize the Perils of Weapons of Mass Exposure Contaminates - part II Disaster Planning: Training for the Perils of Weapons of Mass Exposure, 2020 4. The Security SurveyBeyond Target Hardening: Preparing Community-wide Security Surveys The Access Control Security Survey The Security Survey: A Prescription for Enhancing Security Aspects of the Security Survey: Distinctions Between Single-client, Multi-client, and Community-wide Security Surveys The Security Survey: An Investigative Tool The Security Survey: An Investigative Tool - Part II Revising the Security Survey The Many Faces of the Security Survey 5. Practical Crime PreventionAn Alternate Perspective on Healthcare Crime Prevention A Clinical Approach to Crime Detection A Clinical Approach to Hospital Security The Art and Science of Proactive Security Programming The Varied Roles of the Crime Prevention Expert How is Crime Risk Measured and Managed Using Access and ID Control to Prevent Workplace Violence Workplace Violence Prevention: A Guide to Active Shooter and Workplace Violence Resources Aspects of Crime and Violence Avoidance Squeezing the Most from Your Security Dollar6. Metrics and Data Application " An Alternative View in the Development of Security Metrics " Resources Available for Applying Metrics in Security and Safety Programming " Applying Metrics to 21st Century Healthcare Security7. Physical Security Applications " The Man Behind the Security Camera " Shell Hardening " Digital Security Technology Simplified " Determining and Implementing Successful Access Control Solutions8. Customer Service Initiatives " The Patient Wish List: Getting Customer Service Right " Creating a Customer Service Program for Healthcare Security 9. Auditing and Forensics" Auditing Proactive Security Programs " Auditing Investigative Techniques: Internal Auditing Alert " Auditing Hospital Security " Auditing Crime Analysis Programs " Auditing Warehouse and Loading Dock Security " Auditing Access Control Procedures " Auditing Loss Prevention Programs " The Environmental School of Criminology: Proactive vs. Reactive Security " Auditing Hospital Security: is your Security Program in Compliance " Security Auditing: a Prescription for Keeping Protection Programs Healthy " Aspects of Preparing for a "No Prior Notice" Regulatory Audit " Forensic Accounting and the Criminal Justice Process: Internal Auditing Alert " How Have the Terrorist Attacks of 9/11 Affected the Corporate Hiring Process " Background Checks: A Diagnostic Tool to Decipher Deception " A New Approach to Handling Incoming Verifications " Forensics Role in the Investigative Process 10. Fraud Detection and Prevention" Play it Safe: A Guide to Preventing Shoplifting, Fraud, and Employee Theft " A Team Approach to Fraud Prevention " Delving Deeper to Decipher Fraud " The Fraud Prevention Jackpot " Safeguarding Assets Against Fraud " Objections to Active Fraud Prevention " Steps in a Fraud Audit " Investigating Money Laundering Schemes " Fraud Audit Checklist " The Fraud Equation " Ten Questions an Entrepreneur Should Ask About Fraud " What is Business Espionage and How Can it be Effectively Controlled?" Auditing for Identity Fraud " Aspects of Fraud Prevention " Aspects of Controlling Fraud in Healthcare Facilities11. Interview and Interrogation" Interview vs. Interrogation " Demystifying the Investigative Process " Decrypting the Interrogation Process " The Art of Non-Target Interviewing " Effective Interview Techniques 12. VIP Protection " Aspects of Hospital Security: Protecting the VIP " Aspects of Hospital Security: Protecting the VIP - Part II
    Additional Edition: ISBN 9781032105475
    Additional Edition: ISBN 9781032105499
    Additional Edition: Erscheint auch als Druck-Ausgabe ISBN 9781032105475
    Language: English
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    [Place of publication not identified] :Productivity Press,
    UID:
    almahu_9949385279202882
    Format: 1 online resource (256 pages)
    Edition: First edition.
    ISBN: 9781003215851 , 1003215858 , 9781000545760 , 1000545768 , 9781000545777 , 1000545776
    Content: Healthcare is on a critical path. Evolving with the advent of Obama Care and now Covid-19. How will healthcare and specifically healthcare security adapt over the next few years. What tools will be necessary for healthcare security professionals and all security professionals to meet the demands of the transforming security environment. Security professionals need new tools and programs to adapt security services to the "New Normal." As healthcare emerges from the pandemic threats like active shooter and workplace violence will re-emerge and new threats related to civil unrest, fraud, mergers and further financial struggles will change how healthcare security will function. This book provides a series of articles related to the management and operations of healthcare security which will prepare healthcare security professionals in managing the "New Normal" and into the future. This book is a collection of previously published articles on healthcare security and general security. The book covers various topics related to the management of healthcare security and provides information on general security operations. The book also includes unconventional topics that are necessary in the administration of healthcare security like auditing principles, fraud prevention, investigations, interview and interrogation techniques, and forensics
    Note: 1. The Changing Face of Healthcare Security" How has Hospital Security Changed Since 9/11" Aspects of Hospital Security: How is Hospital Security Changing in the New Century? " Hospital Security in the 21st Century: What Should We Expect " The Changing Face of Hospital Security: Retooling for the Future " The Changing Face of Hospital Security2. Security Management" The Hidden Cost of Downsizing: Where Loyalty Dies, Fraud Grows: " Stretching the Security Dollar " Investigating in a New Environment " Shoplifter Profiles and Tips on How They Steal " Asking the Right Questions About Fire Prevention " Putting the Spotlight on Security " Improving the Dependability of an ID Program 3. Disaster PreparednessTraining Security Officers to Recognize the Perils of Weapons of Mass Destruction and Pandemic Flu Contaminates Training Security Operatives to Recognize the Perils of Weapons of Mass Exposure Contaminates -- part II Disaster Planning: Training for the Perils of Weapons of Mass Exposure, 2020 4. The Security SurveyBeyond Target Hardening: Preparing Community-wide Security Surveys The Access Control Security Survey The Security Survey: A Prescription for Enhancing Security Aspects of the Security Survey: Distinctions Between Single-client, Multi-client, and Community-wide Security Surveys The Security Survey: An Investigative Tool The Security Survey: An Investigative Tool -- Part II Revising the Security Survey The Many Faces of the Security Survey 5. Practical Crime PreventionAn Alternate Perspective on Healthcare Crime Prevention A Clinical Approach to Crime Detection A Clinical Approach to Hospital Security The Art and Science of Proactive Security Programming The Varied Roles of the Crime Prevention Expert How is Crime Risk Measured and Managed Using Access and ID Control to Prevent Workplace Violence Workplace Violence Prevention: A Guide to Active Shooter and Workplace Violence Resources Aspects of Crime and Violence Avoidance Squeezing the Most from Your Security Dollar6. Metrics and Data Application " An Alternative View in the Development of Security Metrics " Resources Available for Applying Metrics in Security and Safety Programming " Applying Metrics to 21st Century Healthcare Security7. Physical Security Applications " The Man Behind the Security Camera " Shell Hardening " Digital Security Technology Simplified " Determining and Implementing Successful Access Control Solutions8. Customer Service Initiatives " The Patient Wish List: Getting Customer Service Right " Creating a Customer Service Program for Healthcare Security 9. Auditing and Forensics" Auditing Proactive Security Programs " Auditing Investigative Techniques: Internal Auditing Alert " Auditing Hospital Security " Auditing Crime Analysis Programs " Auditing Warehouse and Loading Dock Security " Auditing Access Control Procedures " Auditing Loss Prevention Programs " The Environmental School of Criminology: Proactive vs. Reactive Security " Auditing Hospital Security: is your Security Program in Compliance " Security Auditing: a Prescription for Keeping Protection Programs Healthy " Aspects of Preparing for a "No Prior Notice" Regulatory Audit " Forensic Accounting and the Criminal Justice Process: Internal Auditing Alert " How Have the Terrorist Attacks of 9/11 Affected the Corporate Hiring Process " Background Checks: A Diagnostic Tool to Decipher Deception " A New Approach to Handling Incoming Verifications " Forensics Role in the Investigative Process 10. Fraud Detection and Prevention" Play it Safe: A Guide to Preventing Shoplifting, Fraud, and Employee Theft " A Team Approach to Fraud Prevention " Delving Deeper to Decipher Fraud " The Fraud Prevention Jackpot " Safeguarding Assets Against Fraud " Objections to Active Fraud Prevention " Steps in a Fraud Audit " Investigating Money Laundering Schemes " Fraud Audit Checklist " The Fraud Equation " Ten Questions an Entrepreneur Should Ask About Fraud " What is Business Espionage and How Can it be Effectively Controlled?" Auditing for Identity Fraud " Aspects of Fraud Prevention " Aspects of Controlling Fraud in Healthcare Facilities11. Interview and Interrogation" Interview vs. Interrogation " Demystifying the Investigative Process " Decrypting the Interrogation Process " The Art of Non-Target Interviewing " Effective Interview Techniques 12. VIP Protection " Aspects of Hospital Security: Protecting the VIP " Aspects of Hospital Security: Protecting the VIP -- Part II
    Additional Edition: Print version : ISBN 9781032105499
    Language: English
    Keywords: Electronic books.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Did you mean 1000215776?
Did you mean 1000244776?
Did you mean 1000045706?
Close ⊗
This website uses cookies and the analysis tool Matomo. Further information can be found on the KOBV privacy pages